Credit card fraud detection using hidden Markov model A Srivastava, A Kundu, S Sural, AK Majumdar Dependable and Secure Computing, IEEE Transactions on 5 (1), 37-48, 2008 | 729 | 2008 |
Robust signatures for kernel data structures B Dolan-Gavitt, A Srivastava, P Traynor, J Giffin Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 219 | 2009 |
Self-service cloud computing S Butt, HA Lagar-Cavilla, A Srivastava, V Ganapathy Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 187 | 2012 |
Tamper-resistant, application-aware blocking of malicious network connections A Srivastava, J Giffin Recent Advances in Intrusion Detection, 39-58, 2008 | 156 | 2008 |
Trusted Snapshot Generation A Srivastava, H Raj, P England, P Sharma US Patent App. 13/161,520, 2012 | 125 | 2012 |
Database intrusion detection using weighted sequence mining A Srivastava, S Sural, AK Majumdar Journal of Computers 1 (4), 8-17, 2006 | 100 | 2006 |
Efficient Monitoring of Untrusted Kernel-Mode Execution. A Srivastava, JT Giffin NDSS, 2011 | 78 | 2011 |
Secure multi-party device pairing using sensor data MA Hiltunen, E Miluzzo, A Srivastava US Patent 9,818,315, 2017 | 66 | 2017 |
CloudVMI: Virtual Machine Introspection as a Cloud Service A Srivastava, JV Merwe Proceedings of the 2014 IEEE International Conference on Cloud Engineering …, 2014 | 62* | 2014 |
Weighted intra-transactional rule mining for database intrusion detection A Srivastava, S Sural, A Majumdar Advances in Knowledge Discovery and Data Mining, 611-620, 2006 | 58 | 2006 |
Automatic discovery of parasitic malware A Srivastava, J Giffin Recent Advances in Intrusion Detection, 97-117, 2010 | 56 | 2010 |
Go serverless: securing cloud via serverless design patterns S Hong, A Srivastava, W Shambrook, T Dumitras 10th {USENIX} Workshop on Hot Topics in Cloud Computing (HotCloud 18), 2018 | 48 | 2018 |
Evaluating email’s feasibility for botnet command and control K Singh, A Srivastava, J Giffin, W Lee Dependable Systems and Networks With FTCS and DCC, 2008. DSN 2008. IEEE …, 2008 | 44 | 2008 |
Efficient Protection of Kernel Data Structures via Object Partitioning A Srivastava, J Giffin, HP Fortify | 42 | 2012 |
Flow aware differential delay routing for next-generation Ethernet over SONET/SDH A Srivastava Communications, 2006. ICC'06. IEEE International Conference on 1, 140-145, 2006 | 41 | 2006 |
Trusted VM snapshots in untrusted cloud infrastructures A Srivastava, H Raj, J Giffin, P England RAID, 2012 | 39 | 2012 |
On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment G Pék, A Lanzi, A Srivastava, D Balzarotti, A Francillon, C Neumann Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 37 | 2014 |
Hardening OpenStack Cloud Platforms against Compute Node Compromises WK Sze, A Srivastava, R Sekar Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 31 | 2016 |
Operating system interface obfuscation and the revealing of hidden operations A Srivastava, A Lanzi, J Giffin, D Balzarotti Detection of Intrusions and Malware, and Vulnerability Assessment, 214-233, 2011 | 29 | 2011 |
System and method for crowd-sourcing mobile messaging spam detection and defense AE Skudlark, J Erman, Y Jin, A Srivastava, LK Tran US Patent 9,584,989, 2017 | 24 | 2017 |